[funsec] fastandeasyhacking

2011-01-21 Thread RandallM
my hacking now is fast..thanks to fastandeasyhacking.com...thank you!! and
thanks to cleanmypc I'm up and running

-- 
been great, thanks
RandyM
a.k.a System
___
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

[funsec] It is Today. IANA runs out of IPv4.

2011-01-21 Thread Dragos Ruiu
http://www.ipv4depletion.com/?page_id=326

 

 

--

@dragosr

World Security Pros. Cutting Edge Training, Tools, and Techniques

Vancouver, Canada, March 9-11 2011  http://cansecwest.com 

 

 

___
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Re: [funsec] [article] The iPad in the Hospital and Operating Room

2011-01-21 Thread Shawn Merdinger
Hi James,

Thanks for sharing your insights.

sigh...maybe I'm just getting old, being pragmatic, or selling out --
but my takeaway from this iPad/OR stuff is to patent a single-use iPad
sterile wrapping solution and sell the rights to a medical sterile
packaging company.

Considering the pervasive threat of nasties like MRSA [1] in medical
environments, a single-use sterile iPad bag would help mitigate the
most likely immediate threat to patient safety: dirty iPads crawling
with Staphylococcus Aureus.

ughi'm almost ashamed of myself ;)

Cheers,
--scm

[1]  http://www.cdc.gov/mrsa/

Cheers,
--scm

On Fri, Jan 21, 2011 at 12:50, James Philput  wrote:
> I'm in a similar situation.  We're currently rolling out security policies
> for tablet devices, and have been getting a lot of push back from the
> medical staff.  The thing that seems to be working here is a combination of
> policy and education.  We're allowing personal iPads to be used if the user
> agrees to let us install a basic security profile on the device.  The
> standard profile includes the usual wireless, email and VPN settings that we
> give to other remote users, but it also forces stronger passwords and a
> shorter idle screen lock.  Those settings, coupled with treating all of the
> iDevice/tablets as untrusted resources, have gone a long way toward making
> the things less of a security risk.
>
> We've been trying to plan for more consumer devices on the network.  It
> takes some effort and a bit more flexibility from a policy and procedure
> standpoint, but our willingness to work with the non-tech staff on this
> seems to have gained us a lot of good will.  The users are much more willing
> to listen to why we don't want them to do something rather than just trying
> to find ways to evade us.
>
> Regards,
> James
>
>
> On Fri, Jan 21, 2011 at 11:25 AM, Shawn Merdinger 
> wrote:
>>
>> Hi Phester,
>>
>> On Thu, Jan 20, 2011 at 20:50, phester  wrote:
>> > Yeah, but it illustrates an universal issue. If users can't do what they
>> > want over the network, they'll find a way around it.
>>
>> Exactly.  This is great technology and enables medical pros to do more
>> for patients.
>>
>> But it's also worth mentioning that security people can expect a great
>> deal of pushback from medical pros when trying to assign the risk and
>> place limitations on these kind of consumer devices in a medical
>> environment -- and believe me, they can be a tough group of
>> articulate, forceful and powerful people to deal with.  As a lowly
>> network security monkey, I can vouch that it's no fun to go
>> head-to-head with with a MD with a Ph.D who brings in millions in
>> grants to the organization and wants to use his fancy iPad or iPhone
>> for medical work.
>>
>> And I would go even further in that the article mentions medical
>> schools like Stanford issuing iPads to incoming med students beginning
>> 2014.  So we can expect a entire new group of medical pros who expect
>> support and security with these devices.
>>
>> What's also interesting and a huge, undefined challenge is the
>> blending of these consumer devices into medical devices.  With the
>> addition of medical image viewing software on the iPad, that device
>> has now transitioned from a personal learning/entertainment platform
>> to a bona fide medical device, which opens up many more questions in
>> terms of organizational policy, data management/retention, and
>> regulatory requirements (HIPAA/HITECH, etc.).  After all, one can
>> jailbreak an iPad by visiting a website, clearly there are risks to
>> PHI on a iPad, no?
>>
>> Further compounding the issue are cloud applications, specifically the
>> growing use of personal cloud services like DropBox.  There's a great
>> deal of uncertainty as to the DropBox use with medical information and
>> regulatory requirements.  For more than a year on the DropBox forums,
>> folks have been going back and forth as to if this application meets
>> regulatory requirements.  But, as you note, people are going to do
>> what they want, and this is reinforced by DropBox making it way into
>> "Top 20 Lists" of apps for medical pros [1]
>>
>> And with medical pros not fully understanding how personal storage
>> cloud apps like DropBox actually work insofar as data retention and
>> flow, we are facing tremendous challenges.
>>
>> "When asked about security concerns with the iPad, especially if one
>> is left behind inadvertently, Dr. Feldman pointed out that as with
>> everything web-based, nothing is stored on the device." [2]
>>
>> From a vendor perspective, there are huge opportunities in this space
>> to provide workable security solutions for these kinds of devices and,
>> as Bruce Schneier writes, the "Consumerization and Corporate IT
>> Security" [3]  Bottom line is that we need these solutions to keep the
>> management folks happy with their regulatory compliance goals, and to
>> provide more assurance to network security guys like me who are
>> sweat

[funsec] Fwd: [Infowarrior] - Classified Memo Toughens Cyber-Threat Portrayals In DOD Exercises

2011-01-21 Thread Paul Ferguson
Cheers,

- ferg


Forwarded message --
From: Richard Forno 
Date: Fri, Jan 21, 2011 at 12:26 PM
Subject: [Infowarrior] - Classified Memo Toughens Cyber-Threat
Portrayals In DOD Exercises
To:


(h/t Anonymous)

Inside the Pentagon - 01/20/2011

https://defensenewsstand.com/component/option,com_ppv/Itemid,287/id,2351617/

Classified Memo Toughens Cyber-Threat Portrayals In DOD Exercises

The military's top officer has issued a classified memo directing the
Defense Department to use tougher, more realistic portrayals of cyber
threats in its exercises.

A reference to the September 28, 2010, memo, stamped "secret" and signed by
Chairman of the Joint Chiefs of Staff Adm. Michael Mullen, is buried in the
latest annual report from Michael Gilmore, the Pentagon's operational
testing chief.

Cyber threats portrayed during military exercises have been "consistently
below that expected from a nation-state," but "red teams" playing the enemy
role have generally beaten U.S. defenses, according to the report released
last week by the director of operational test and evaluation (DOT&E).

The report announces that "the level of cyber-threat portrayal in future
exercises is expected to increase significantly" in response to Mullen's
classified memo.

A spokesman for Mullen declined to release the memo, but told Inside the
Pentagon that the excerpts included in the report "seem to summarize an
important point -- that our combatant commands must integrate aggressive
cyber threats into their training events in order for us to maintain our
competitive advantage in the field."

Mullen's directive makes sense because cyber threats are becoming
increasingly sophisticated, said Stewart Baker, who served as the Department
of Homeland Security's first assistant secretary for policy.

"In general, it's fair to say that you have to change your exercises on a
regular basis because the threat gets more consistent on a regular basis,"
Baker told ITP. "If you're still doing the same thing you were doing three
years ago, you're out of date."

Baker acknowledged a "competing consideration" when looking to bolster the
level of cyber-threat portrayal in exercises.

"You don't want to run an exercise between people doing a good job and
people doing a bad job," he said. "If it's so one-sided the attackers win
all the time . . . then the exercise is not actually teaching people
anything." However, "we're going to have to dramatically up our game given
the sophistication of the attacks," he added.

Gilmore's report states that "assessing organizations" within DOD performed
information assurance and interoperability assessments during 21 combatant
command and services exercises, eight of which involved units deployed or
preparing to deploy to Iraq or Afghanistan.

The information assurance posture observed during FY-10 exercise assessments
is insufficient to prevent an advanced adversary from "adversely affecting
the missions that were being exercised," the report states. "Improvements in
certain areas of network defense were observed," but red teams "generally
overcame defense during exercises by increasing their level of effort," the
report adds.

All red teams "reported increasing difficulty in penetrating network
defense," but with sufficient time, they "typically managed to penetrate
networks and systems," the report states. Although in some cases red teams
were "successfully blocked from employing certain attacks due to specific
preparations or precautions on the part of network defenders," the overall
assessment is that information assurance "remains a significant operational
concern" across the Defense Department, according to the report.

DOD's operational testers also conducted interoperability assessments on
cyber exercises and found that issues encountered "typically hindered,
rather than prevented, mission accomplishment" due to "operators who
developed and executed effective workarounds." But the workarounds "often
resulted in degraded efficiency of completing tasks," the report adds.

-- Amanda Palleschi
___
Infowarrior mailing list
infowarr...@attrition.org
https://attrition.org/mailman/listinfo/infowarrior


[end]

-- 
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/

___
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Re: [funsec] [article] The iPad in the Hospital and Operating Room

2011-01-21 Thread James Philput
I'm in a similar situation.  We're currently rolling out security policies
for tablet devices, and have been getting a lot of push back from the
medical staff.  The thing that seems to be working here is a combination of
policy and education.  We're allowing personal iPads to be used if the user
agrees to let us install a basic security profile on the device.  The
standard profile includes the usual wireless, email and VPN settings that we
give to other remote users, but it also forces stronger passwords and a
shorter idle screen lock.  Those settings, coupled with treating all of the
iDevice/tablets as untrusted resources, have gone a long way toward making
the things less of a security risk.

We've been trying to plan for more consumer devices on the network.  It
takes some effort and a bit more flexibility from a policy and procedure
standpoint, but our willingness to work with the non-tech staff on this
seems to have gained us a lot of good will.  The users are much more willing
to listen to why we don't want them to do something rather than just trying
to find ways to evade us.

Regards,
James


On Fri, Jan 21, 2011 at 11:25 AM, Shawn Merdinger wrote:

> Hi Phester,
>
> On Thu, Jan 20, 2011 at 20:50, phester  wrote:
> > Yeah, but it illustrates an universal issue. If users can't do what they
> > want over the network, they'll find a way around it.
>
> Exactly.  This is great technology and enables medical pros to do more
> for patients.
>
> But it's also worth mentioning that security people can expect a great
> deal of pushback from medical pros when trying to assign the risk and
> place limitations on these kind of consumer devices in a medical
> environment -- and believe me, they can be a tough group of
> articulate, forceful and powerful people to deal with.  As a lowly
> network security monkey, I can vouch that it's no fun to go
> head-to-head with with a MD with a Ph.D who brings in millions in
> grants to the organization and wants to use his fancy iPad or iPhone
> for medical work.
>
> And I would go even further in that the article mentions medical
> schools like Stanford issuing iPads to incoming med students beginning
> 2014.  So we can expect a entire new group of medical pros who expect
> support and security with these devices.
>
> What's also interesting and a huge, undefined challenge is the
> blending of these consumer devices into medical devices.  With the
> addition of medical image viewing software on the iPad, that device
> has now transitioned from a personal learning/entertainment platform
> to a bona fide medical device, which opens up many more questions in
> terms of organizational policy, data management/retention, and
> regulatory requirements (HIPAA/HITECH, etc.).  After all, one can
> jailbreak an iPad by visiting a website, clearly there are risks to
> PHI on a iPad, no?
>
> Further compounding the issue are cloud applications, specifically the
> growing use of personal cloud services like DropBox.  There's a great
> deal of uncertainty as to the DropBox use with medical information and
> regulatory requirements.  For more than a year on the DropBox forums,
> folks have been going back and forth as to if this application meets
> regulatory requirements.  But, as you note, people are going to do
> what they want, and this is reinforced by DropBox making it way into
> "Top 20 Lists" of apps for medical pros [1]
>
> And with medical pros not fully understanding how personal storage
> cloud apps like DropBox actually work insofar as data retention and
> flow, we are facing tremendous challenges.
>
> "When asked about security concerns with the iPad, especially if one
> is left behind inadvertently, Dr. Feldman pointed out that as with
> everything web-based, nothing is stored on the device." [2]
>
> From a vendor perspective, there are huge opportunities in this space
> to provide workable security solutions for these kinds of devices and,
> as Bruce Schneier writes, the "Consumerization and Corporate IT
> Security" [3]  Bottom line is that we need these solutions to keep the
> management folks happy with their regulatory compliance goals, and to
> provide more assurance to network security guys like me who are
> sweating bullets and worrying in the trenches as we face irate medical
> pros with serious pull who expect us to not only secure these devices,
> but also take on the liability risks of data loss.
>
> > Said hospitals need to find a way to provide function securely. Solutions
> > are out there.
>
> You mention there are solutions out there.  I welcome further
> discussion, either off-list or on-list.
>
> Cheers,
> --scm
>
>
> [1]
> http://www.imedicalapps.com/2010/12/bes-free-iphone-medical-apps-doctors-health-care-professionals/19/
> [2]
> http://www.imedicalapps.com/2010/12/dropbox-osirix-ipad-radiology-images-operating-room/
> [3]  http://www.schneier.com/blog/archives/2010/09/consumerization.html
> ___
> Fun and Mis

Re: [funsec] [article] The iPad in the Hospital and Operating Room

2011-01-21 Thread Shawn Merdinger
Hi Phester,

On Thu, Jan 20, 2011 at 20:50, phester  wrote:
> Yeah, but it illustrates an universal issue. If users can't do what they
> want over the network, they'll find a way around it.

Exactly.  This is great technology and enables medical pros to do more
for patients.

But it's also worth mentioning that security people can expect a great
deal of pushback from medical pros when trying to assign the risk and
place limitations on these kind of consumer devices in a medical
environment -- and believe me, they can be a tough group of
articulate, forceful and powerful people to deal with.  As a lowly
network security monkey, I can vouch that it's no fun to go
head-to-head with with a MD with a Ph.D who brings in millions in
grants to the organization and wants to use his fancy iPad or iPhone
for medical work.

And I would go even further in that the article mentions medical
schools like Stanford issuing iPads to incoming med students beginning
2014.  So we can expect a entire new group of medical pros who expect
support and security with these devices.

What's also interesting and a huge, undefined challenge is the
blending of these consumer devices into medical devices.  With the
addition of medical image viewing software on the iPad, that device
has now transitioned from a personal learning/entertainment platform
to a bona fide medical device, which opens up many more questions in
terms of organizational policy, data management/retention, and
regulatory requirements (HIPAA/HITECH, etc.).  After all, one can
jailbreak an iPad by visiting a website, clearly there are risks to
PHI on a iPad, no?

Further compounding the issue are cloud applications, specifically the
growing use of personal cloud services like DropBox.  There's a great
deal of uncertainty as to the DropBox use with medical information and
regulatory requirements.  For more than a year on the DropBox forums,
folks have been going back and forth as to if this application meets
regulatory requirements.  But, as you note, people are going to do
what they want, and this is reinforced by DropBox making it way into
"Top 20 Lists" of apps for medical pros [1]

And with medical pros not fully understanding how personal storage
cloud apps like DropBox actually work insofar as data retention and
flow, we are facing tremendous challenges.

"When asked about security concerns with the iPad, especially if one
is left behind inadvertently, Dr. Feldman pointed out that as with
everything web-based, nothing is stored on the device." [2]

>From a vendor perspective, there are huge opportunities in this space
to provide workable security solutions for these kinds of devices and,
as Bruce Schneier writes, the "Consumerization and Corporate IT
Security" [3]  Bottom line is that we need these solutions to keep the
management folks happy with their regulatory compliance goals, and to
provide more assurance to network security guys like me who are
sweating bullets and worrying in the trenches as we face irate medical
pros with serious pull who expect us to not only secure these devices,
but also take on the liability risks of data loss.

> Said hospitals need to find a way to provide function securely. Solutions
> are out there.

You mention there are solutions out there.  I welcome further
discussion, either off-list or on-list.

Cheers,
--scm


[1]  
http://www.imedicalapps.com/2010/12/bes-free-iphone-medical-apps-doctors-health-care-professionals/19/
[2]  
http://www.imedicalapps.com/2010/12/dropbox-osirix-ipad-radiology-images-operating-room/
[3]  http://www.schneier.com/blog/archives/2010/09/consumerization.html
___
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.